Driving Force Software

Solutions for the Small Business and Enterprise

Thursday, February 14, 2019

Your Google+ account is going away on April 2, 2019. Learn more

Your Google+ account is going away on April 2, 2019. Learn morWow!  Google fails to capture the FaceBook market.




Who remembers MySpace?  It was the original Social Networking site that was supplanted by Facebook.  Now Google+ faces the same fate.  Google+ for personal use will end on April 2, 2019 due to low useage rates.

Read more the entire story at;  https://support.google.com/plus/answer/9195133?hl=en&authuser=0



- February 14, 2019 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Google+
Password-stealing phishing attack comes disguised as a fake meeting request from the boss

I believe that most of my Office 365 cloud-based clients are now wary of the many different phishing attempts to steal login credentials via fake Microsoft login sites.  Phishing emails arrive using different tactics to entice you into surrendering your information.

Some examples;  you receive an email with an attached phone message, PDF attachment or a fax document.  When you click on the attachment or link it takes you to either a realistic replica of the Microsoft portal or a not so realistic page that require you to log in with your Office 365 or Outlook credentials.  These criminals have started including all major email services including Gmail, Yahoo, and other services on the landing page.  In many cases, they have already included your email address since they know who the phishing attempt was sent to.  All that is required to wreak havoc on you is your password.

If the email requires you to log in using your email and password to retrieve the document or attachment then assume it is a scam.  In either case, your login information is captured and then used to generate spam or steal your personal and financial information.

This week I have assisted 2 compromised clients.  Fortunately, in both cases damage was minimal.  The first client alerted me quickly when she started receiving email replies and phone call from contacts regarding spam sent from her  email.  In this instance, the hacker did not hide his tracks and I was able to retrieve IP info and track back to Lagos, Nigeria, not like there is any retribution for the perp.

The latest attempt shows an advancement in sophistication and tactics.

It just so happened I was doing some work for the client when the email arrived.  It was from the client's legit email address, but what got my interest was no address listed under the To:  field.


I opened my secure browser and copied and followed the link, it took me to a fake landing page and asked for my Office 365 credentials to retrieve the document.  Suspecting that the client had been compromised, I replied to the email and asked if he had sent it.  I received a reply almost instantly,

Yes, I sent it. It's quite a good read and definitely the most insightful I have read on. It's something that you will be more interested in.

Thanks

I logged into the Office Portal as the Global Admin and checked the Inbox Rules for the affected account.  There was a rule in place to delete all incoming emails.  This is done to prevent the victim from receiving emails like mine asking if the email was sent by them.  Often you will find that a forwarding email has been set up so incoming emails are sent to the hacker before deleting.  In this case, there wasn't a rule for forwarding.  However, I know there was a forward in place somehow since the perp was responding to my email, perhaps an autoreply with a standard message.

I was unable to reach the client by phone so after conferring with the office manager we decided it was best to change the password of the affected account.  She too had received the email.  When I was able to talk to the client by phone it turns out he was busy fielding calls from contacts who had received the email.

My next step was to ascertain the source of the email. This led to a new surprise.  This is the first example of this I've found, there were no internet headers.



 In concluding, be wary of any email with an attachment that requires your email credentials to retrieve.  It is a scam.

The Dangers when surfing the Internet

Emails are not the only way a hacker can exploit your machine.  Websites can be used to deliver malicious payloads to your machine that can steal your information or exploit your machine for use by the attacker.

Some popular add-ins and programs have been exploited in the past to infect computers by fake updates or exploiting security holes and weaknesses.  Adobe Flash Player, Java come to mind.  Popular programs for creating web pages are also attacked.  WordPress due to its popularity is no exception.

https://www.zdnet.com/article/another-wordpress-commercial-plugin-gets-exploited-in-the-wild/


Macs too are always under attack.  The latest Trojan:  https://www.zdnet.com/article/macos-malware-disables-gatekeeper-to-deploy-malicious-payloads/


Laugh of the Day, poor Internet Explorer...






- February 14, 2019 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Apple, email, exploits, Mac, malware, phishing, scam, trojan, wordpress
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Kaspersky Ban, Latest Security News

The latest Security News and Anti-Virus options in wake of US Kaspersky ban. With the impending 09/29/24 drop dead date for receiving update...

  • Kaspersky Ban, Latest Security News
    The latest Security News and Anti-Virus options in wake of US Kaspersky ban. With the impending 09/29/24 drop dead date for receiving update...
  • Malware - How did I get Malware?
    Each time I remove Malware aka rogueware from an infected computer, I am always asked "How did I get this...?" When I try and exp...
  • QUISHING!!! QR code Phishing... new Email Threat.
    QR Code phishing while not new is on the rise.  QR codes (Quick Response codes) became widely popular during and after the pandemic.  Many l...

Search This Blog

  • Home

About Me

dforce
Atlanta, Georgia, United States
Free Radical, Ltd dba Driving Force Software. We are a 25 year old computer networking firm located in Atlanta, Georgia. Our senior tech has approximately 30 years experience in software design, system building and networking. Driving Force is on the forefront of implementing and securing systems and networks via hardware firewalls as well as intrusion detection. Free Radical, Ltd dba Driving Force Software is a Microsoft Dynamics GP Partner as well as an Intel Gold Partner.
View my complete profile

Blog Archive

  • ►  2024 (3)
    • ►  September (1)
    • ►  August (1)
    • ►  January (1)
  • ►  2023 (12)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (2)
    • ►  July (1)
    • ►  June (2)
    • ►  March (1)
    • ►  January (3)
  • ►  2022 (13)
    • ►  November (1)
    • ►  October (3)
    • ►  September (2)
    • ►  August (1)
    • ►  July (2)
    • ►  May (1)
    • ►  March (1)
    • ►  February (2)
  • ►  2021 (10)
    • ►  December (3)
    • ►  November (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (2)
    • ►  March (1)
  • ►  2020 (10)
    • ►  October (2)
    • ►  September (2)
    • ►  July (1)
    • ►  June (2)
    • ►  March (1)
    • ►  February (2)
  • ▼  2019 (30)
    • ►  December (2)
    • ►  November (2)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  July (2)
    • ►  June (1)
    • ►  May (3)
    • ►  April (5)
    • ►  March (3)
    • ▼  February (2)
      • Your Google+ account is going away on April 2, 201...
      • Password-stealing phishing attack comes disguised ...
    • ►  January (4)
  • ►  2018 (27)
    • ►  December (3)
    • ►  November (3)
    • ►  October (2)
    • ►  August (6)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (5)
    • ►  March (2)
    • ►  February (1)
    • ►  January (2)
  • ►  2017 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
    • ►  May (2)
    • ►  March (3)
    • ►  February (2)
    • ►  January (5)
  • ►  2016 (16)
    • ►  December (3)
    • ►  November (2)
    • ►  October (3)
    • ►  September (1)
    • ►  July (1)
    • ►  June (1)
    • ►  April (3)
    • ►  February (2)
  • ►  2015 (7)
    • ►  November (3)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  March (1)
  • ►  2014 (9)
    • ►  October (1)
    • ►  August (2)
    • ►  April (4)
    • ►  March (1)
    • ►  January (1)
  • ►  2013 (13)
    • ►  November (1)
    • ►  October (3)
    • ►  September (2)
    • ►  July (1)
    • ►  March (1)
    • ►  February (3)
    • ►  January (2)
  • ►  2012 (15)
    • ►  November (2)
    • ►  October (2)
    • ►  September (1)
    • ►  August (2)
    • ►  July (4)
    • ►  June (2)
    • ►  April (2)
  • ►  2011 (2)
    • ►  May (1)
    • ►  April (1)
  • ►  2010 (9)
    • ►  September (2)
    • ►  June (1)
    • ►  May (1)
    • ►  April (4)
    • ►  March (1)

Labels

  • .lnk
  • "Weeping Angel"
  • $199 Chromebook
  • 1 800 scams
  • 15-inch Macbook Pro
  • 1809
  • 1903
  • 2016
  • 2018
  • 2020 election
  • 2022
  • 22H2 update
  • 23andMe
  • 2990WX
  • 35 days
  • 4690K
  • 4790K
  • 4G
  • 4G LTE
  • 5 rules for using the internet after heartbleed
  • 5G
  • 6th Gen
  • 737 max
  • 7th Gen
  • 7th Generation processors
  • 80211.ac
  • 87 million users
  • 8th generation
  • 8x8
  • 98.0.4758.102
  • 9th generation
  • Acer
  • Acer C7 Chromebook
  • Acer H340
  • Add-ons
  • Adobe
  • Adobe Creative Suite
  • AI
  • Airpods
  • Albany
  • Albany New York
  • Albany NY
  • Alexa
  • Amazaon
  • Amazon
  • Amazon Prime
  • Amazon S3 Server
  • amazon sidewalk
  • Amazon Web Services
  • amd
  • American Greed
  • american iphone
  • and CVE-2021-27065
  • Android
  • Android Apps
  • Android mini PC
  • android trojan
  • Aniiversary Edition
  • anti virus
  • antivirus
  • Apple
  • Apple DDos
  • Apple earnings
  • apple event 2020
  • Apple Event; iphone
  • Apple Fanbois
  • Apple homepod
  • Apple Macbook Pro
  • apple malware
  • apple market cap
  • Apple Music
  • apple pay
  • apple security
  • Apple sucks
  • Apple TV
  • apple tv app
  • Apple upgrade
  • apple watch
  • Apple Woes
  • Apple; desktops
  • Applie iCloud
  • arm
  • artifical intelligence
  • astaroth
  • atlanta
  • atlanta ransomware
  • ATM attack
  • Auto Mute
  • autopilot
  • autosteer
  • avast
  • AWS
  • Backdoor.AndroidOS.Obad.a
  • Backup
  • ban
  • banks hacked
  • banned from Airlines
  • bans
  • barrons
  • Basic Authentication
  • battery fires
  • bent ipads
  • best browsers
  • best buy
  • Bill Nye
  • BitCoin
  • bitdefender
  • bitpaymer
  • black screen
  • blueleaks
  • bot-nets
  • botnet
  • Brave
  • brave browser
  • breach
  • breaches
  • Britain Surveillance law
  • browser
  • browser bug
  • browser password
  • browser security
  • Browsers
  • bugs
  • BYOD
  • cambridge analytica
  • candy crush
  • capital one
  • captcha
  • carbanak
  • carbonite
  • casino
  • casino hacker
  • ccleaner
  • cernsorship
  • CES
  • CES 2017
  • change password
  • Cheaper iPhone
  • China
  • china search engine
  • chinese
  • Chinese OS
  • chip
  • Christmas
  • Chrome
  • Chrome 66
  • Chrome download
  • Chrome Http
  • chrome OS
  • Chrome Remote Desktop
  • chrome ui
  • chrome version 71
  • Chromebook
  • Chromebook Pro
  • Chromebooks
  • Chromecast
  • Chromium
  • Chromium Project
  • CIA
  • city of atlanta
  • clearnet
  • clorox hack
  • cloud
  • Cloud computing
  • cloud pbx
  • cloud providers
  • CNBC
  • CNBC American Greed
  • CNET
  • Cobalt Strike
  • colorado dot
  • Comcast Business
  • comodo
  • Comodo Dragon
  • compromised accounts
  • computer
  • Computer repair
  • computers
  • Consumer Electronics Show
  • controlled folder access
  • controls
  • Core 87
  • Core i3
  • Core i5
  • core i5 4670k
  • Core i7
  • core i9
  • countdown clock
  • covid scams
  • covid-19 scams
  • CPU
  • crackdown
  • crapware
  • Crash Wednesday
  • CrashPlan
  • Creators Update
  • credentials.
  • credit
  • CRM
  • crossloop
  • CrowdStrike
  • crypto
  • cryptolocker
  • crytolocker
  • cvd-2020-1472
  • CVE-2021-26855
  • CVE-2021-26857
  • CVE-2021-26858
  • CVE-2022-0609
  • Cyber Crime
  • Cyber-attack
  • cyber-security
  • cyberattack
  • cybersecurity
  • DaaS
  • dark mode
  • Dark Web
  • dashlane
  • data
  • data breach
  • Data breaches
  • data saver
  • DDoS
  • DDos Tibetan
  • Dead
  • death of MAC
  • Death of the PC
  • deepfake
  • deepfakes
  • Dell
  • Delta Air
  • desktop
  • dforce
  • dforce xtreme computer
  • dharma
  • digital security
  • Disney
  • districts
  • Dooble
  • Dragonfly
  • driving force
  • Driving Force Software
  • Dual Boot
  • duckduckgo
  • Dynamics
  • Dynamics GP
  • Echo
  • echo dot
  • Edge
  • efax malware
  • Electro-Quasistatic Human Body Communication
  • elon musk
  • email
  • emotet
  • encrypted files
  • encryption
  • enternalbule
  • Epic
  • EQS-HBC
  • Equation
  • Equifax
  • ETH
  • Ethereum
  • evil corp
  • Excel performance
  • Exchange
  • exchange zero day
  • experian
  • expiration dates
  • Exploit Wednesday
  • exploits
  • extension
  • extensions
  • external hard drive
  • face time
  • facebook
  • Fake Funeral Notice
  • fake tech support
  • fall creators update
  • FBI
  • FBI Virus
  • FBI.gov
  • Fiber
  • Files Deleted
  • Firefox
  • Fires
  • firewalls
  • fixes
  • Flash player
  • free credit monitoring
  • free cubby
  • free radical
  • free remote access
  • FruityArmor
  • FTC.gov
  • GA Tech
  • galaxy note 9
  • Gamer desktops
  • gamers
  • gaming
  • gcman
  • geek squad
  • Gen 7
  • Gen 8
  • Generation 8
  • Generation 9
  • Genius Bar
  • georgia digital id
  • georgia digital license
  • Georgia drivers license
  • Georgia Tech
  • Gigabyte Internet
  • GMail
  • Google
  • google chrome
  • Google Chrome browser
  • Google Docs
  • google extensions
  • Google Fiber
  • google home
  • google urls
  • Google+
  • gotomypc
  • Goverment urges users to switch browers
  • GP
  • GPUs
  • grade
  • GTX 1050
  • guest networks
  • Hack
  • hacked
  • hacker
  • hackers
  • Hafnium
  • hamas
  • hancitor
  • Haswell
  • Have I been
  • haveibeenpawned
  • Heartbleed
  • Hello Again
  • Hold Security
  • Home Internet
  • home internet lite
  • home network security
  • Homeland security
  • HomePod
  • honeypot
  • hospital
  • html5
  • HTTPS Everywhere
  • https://haveibeenpwned.com/
  • Hulu
  • ibm
  • Ice Dragon
  • IcedID
  • icloud
  • icloud password
  • identify theft
  • IDENTITY
  • IDENTITY THEFT
  • identity-theft
  • IDF malware
  • IE
  • IE Zero Day Bug
  • implantable medical devices
  • In a first
  • India
  • India cyberattack
  • indian call center
  • infected servers
  • Inspiron
  • Inspiron 15 7000
  • Intego
  • intel
  • intel 4th gen
  • Intel 6th Gen
  • Intel 8 Gen
  • intel computer
  • intel core i3
  • intel core i5
  • intel desktops
  • Intel Gen 8
  • Internet
  • internet connectivity
  • Internet Explorer
  • internet passwords
  • IOS
  • iOS 14.0.1
  • iOS bugs
  • IOS patch
  • ios watchos
  • IP phones
  • ipad
  • iPad 4
  • iPad 4 upgrade
  • ipad air
  • ipad air 4
  • iPad Mini
  • ipad pro
  • iPhone
  • iphone 11
  • iphone 11 pro
  • iphone 12
  • iphone a crappy device
  • iphone anniversary
  • iphone dud
  • iphone in india
  • iphone password
  • iphone sales down
  • iPhone X
  • iphone xs
  • iPhone5
  • iPod
  • ISP
  • israel
  • Israel responds to Hamas hackers with an air strike
  • IT
  • IT Outage
  • it security
  • iwatch
  • jackson county
  • java
  • july 29
  • Kaby Lake
  • kali
  • Kaspersky
  • Kaspersky ban
  • kaspersky safe money
  • KAV
  • Kindle scam
  • komando
  • kronos
  • Lacie
  • lastpass
  • latency.
  • Lenova Yoga
  • Lenovo Twist
  • Linux
  • Locky
  • log4shell
  • LogMein
  • logmein rate increase
  • louisiana
  • Mac
  • Mac anti-virus software
  • Mac malware
  • MAC mini
  • mac remote wipe
  • Mac Virus
  • MacBook
  • MacBook Pro
  • macros
  • Macs
  • MacWorld
  • maersk
  • malware
  • malware decryption tools
  • malware targets
  • malwarebytes
  • malwarebytes flaw
  • malwaretech
  • man in middle
  • market cap
  • Marriott
  • mcafee
  • McAfee for Mac
  • MEI
  • Meltdown
  • meta
  • metel
  • Metro
  • Metro UI
  • mfa
  • Michaels
  • Michaels stores
  • microsoft
  • Microsoft 365
  • Microsoft end of support
  • microsoft security scam
  • microsoft store
  • microsoft surface
  • Microsoft Update
  • Microsoft Windows 10
  • mikogo
  • millenials malware targets
  • minecraft
  • mining
  • mitm
  • Mobile Malware
  • Mozilla
  • MS Dynamics
  • MS Office 365
  • MS365
  • multi-factor authentication
  • muncipal railway
  • myanmar
  • myspace
  • Napster
  • netflix
  • Netlogon
  • new orleans
  • newspapers
  • nigeria
  • Nobellum
  • nola
  • norton
  • notebooks
  • notebooks kaby lake
  • notifications
  • notpetya
  • nvidia
  • Nvidia RTX 3090
  • NZXT
  • Obad.a
  • October 1
  • October Update
  • office
  • office 2007
  • Office 2010
  • office 2010 discount
  • office 2019
  • office 365
  • oklahoma data breach
  • One Tab
  • OneCare
  • Onedrive
  • onionland
  • online info
  • online privacy
  • online scams
  • online security
  • online shopping
  • Opera
  • Optane
  • Optane Memory
  • oracle
  • os exploits
  • OS market Share
  • Outage
  • Outlook.com
  • Panera
  • passcode
  • password
  • password expiring
  • password manager
  • password protection
  • passwords
  • passwords. haveibeenpwned
  • patch tuesday
  • pause update
  • Pawned
  • pc
  • PC performance
  • PC sales
  • PC Security
  • pcnow
  • pcs
  • personal information
  • phenom II
  • phishers
  • phishing
  • phone scam
  • Phorpiex
  • playboy
  • plus code
  • plus codes
  • portal
  • POS
  • POS malware
  • Prime
  • Prime Day
  • privacy
  • privacy essentials
  • privacy extensions
  • Priya Anand
  • problems
  • processors
  • project zero
  • protecting your info
  • protection.
  • pwn2own
  • qr codes
  • quick response codes
  • Quicktime
  • quishing
  • raging grannies
  • ransom
  • ransomware
  • ransomware attack
  • Raspberry Pi
  • RAT
  • red hat
  • red iphone
  • Remote access
  • Remote Access Trojan
  • remote desktop
  • remote work
  • remotepc
  • REvil
  • ring devices
  • rogue ware
  • router
  • routers
  • RTX 30 series
  • RTX 3070
  • RTX 3080
  • russia
  • Russian Hackers
  • Russians
  • ryuk
  • Ryzen
  • S.C. Tax
  • S3
  • Safari
  • safe money
  • sales
  • samsam
  • samsung
  • san francisco malware
  • sandbox
  • scam
  • scammers
  • scams
  • scattered spider
  • school
  • scorecard
  • search engines
  • Sears
  • Secure Boot
  • security
  • security patches
  • Server
  • settings
  • sextortion
  • SharePoint
  • shortage
  • sidewalk
  • Silence Hackers
  • silver sparrow
  • sites affected by heartbleed
  • sluggish performance
  • Smart devices
  • Smart Phone
  • smart speakers
  • smart TVs
  • smartphone
  • smartphone security
  • smishing
  • sms
  • Snip
  • snoopers' charter
  • social media
  • sodin
  • sodinokibi
  • software
  • SOL
  • Solana
  • SolarWinds
  • SonicWall
  • Sony DDOS attack
  • South Carolina DOR
  • South Carolina Tax Info Hack
  • spacex
  • Spam
  • Spammers
  • spectre
  • Spotify
  • Spring Creators Update
  • spyware
  • ssd
  • starlink
  • Starwood hack
  • Steve Jobs
  • Stock
  • Stolen passwords
  • streaming
  • Streaming Services.
  • strong passwords
  • stuxnet
  • sundar pichai
  • Surface
  • Surface Go
  • Surface Studio
  • suspicious emails
  • sync
  • sync password
  • T-Mo
  • T-Mobile
  • Tab Wrangler
  • Tablet
  • teamviewer
  • tech-support scammers
  • Technical Preview
  • tesla
  • tesla hacked
  • The great suspender
  • THEFT
  • Threadripper
  • Threshold
  • Threshold 2
  • throughput
  • tiktok
  • tile trackers
  • tips
  • Tor
  • Tor browser
  • totalav
  • Tribune Publishing
  • tricks
  • Trik
  • Trillion
  • trojan
  • trojans
  • Trump
  • Turkish Crime Family
  • twitter
  • Ubuntu
  • UEFI
  • Ukraine
  • unmineable
  • update
  • update Tuesday
  • updates
  • upgrade
  • upgrades
  • us firms pay cash to hackers
  • us marshals
  • USAID
  • user interface
  • version 1703
  • version 1803
  • version 1809
  • version 1903
  • virus
  • VISA
  • vmware
  • Voter Leak
  • VPNFilter
  • vulnerabilities
  • wannacry
  • wastedlocker
  • web shells
  • webcam
  • webex
  • wfh
  • WHS
  • WIDI
  • wifi security
  • WikiLeaks
  • Window 10
  • Windows
  • Windows 10
  • Windows 10 2004
  • Windows 10 compatibility
  • windows 10 deadline
  • Windows 10 Free
  • Windows 10 Release
  • windows 10 security
  • Windows 10 Technical preview
  • windows 10 upgrade
  • Windows 11
  • Windows 12
  • WIndows 1803
  • Windows 7
  • windows 7 support
  • Windows 8
  • windows 8 old PC
  • Windows 8 older computer
  • Windows 8 ready computers
  • Windows 8 special pricing
  • windows 8 upgrade
  • windows 8 upgrade offer
  • Windows 8 upgrade special
  • Windows 8 upgrade. Windows 8 features
  • Windows 8.1
  • Windows 8.1 Release Data
  • Windows 9
  • windows as a server
  • Windows build
  • windows defender
  • WIndows Home Server
  • windows lifecyle
  • Windows Performance
  • Windows Phone
  • windows settings
  • Windows update
  • windows updates
  • windows upgrade
  • Windows version
  • Windows XP
  • windowslatest.com
  • winver
  • wireless
  • wireless 80211ac
  • wmic
  • wordpress
  • Workstation
  • workstations
  • WPA
  • WPA2
  • WPA3
  • wsus
  • Xmas
  • XP support
  • xr
  • Yahoo hack
  • Yandex
  • YouTube
  • ZDNet
  • zero day
  • zero-day
  • zero-day bug
  • zero-day exploits
  • Zeus Trojan
  • Zeus Virus
  • zoom
  • zoominfo

Report Abuse

Followers

Subscribe Now: google

Add to Google Reader or Homepage

Add to My AOL

Powered by FeedBurner

Subscribe to Driving Force Software

Follow this blog
Awesome Inc. theme. Powered by Blogger.